UK accused of political ‘foreign cyberattack’ on US after serving secret snooping order on Apple
13
Feb
2025

UK accused of political ‘foreign cyberattack’ on US after serving secret snooping order on Apple

An unprecedented letter from the US Congress, released today, accuses the UK of “a foreign cyberattack waged through political means”….

Top cryptography experts join calls for UK to drop plans to snoop on Apple’s encrypted data
13
Feb
2025

Top cryptography experts join calls for UK to drop plans to snoop on Apple’s encrypted data

Over a hundred cyber security experts, companies and civil society groups have signed a letter calling for the Home Secretary,…

Hacker leaks account data of 12 million Zacks Investment users
13
Feb
2025

Hacker leaks account data of 12 million Zacks Investment users

Zacks Investment Research (Zacks) last year reportedly suffered another data breach that exposed sensitive information related to roughly 12 million…

North Korean hackers spotted using ClickFix tactic to deliver malware
13
Feb
2025

North Korean hackers spotted using ClickFix tactic to deliver malware

North Korean state-sponsored group Kimsuky (aka Emerald Sleet, aka VELVET CHOLLIMA) is attempting to deliver malware to South Korean targets…

Naveen Goud
13
Feb
2025

Celebrate Valentine’s Day 2025 by steering clear of romance scams

Valentine’s Day 2025 is just around the corner, and many men are likely busy picking out thoughtful gifts to impress…

CAPTCHA Trick on Webflow
13
Feb
2025

Hackers Use CAPTCHA Trick on Webflow CDN PDFs to Bypass Security Scanners

Feb 13, 2025Ravie LakshmananWeb Security / Cloud Security A widespread phishing campaign has been observed leveraging bogus PDF documents hosted…

EU looks to ramp up sovereign tech as Trump trade war begins
13
Feb
2025

EU looks to ramp up sovereign tech as Trump trade war begins

As the European Union (EU) prepares to respond to Trump’s 25% tariff on aluminium and steel, a widely reported paper…

China-linked APTs' tool employed in RA World Ransomware attack
13
Feb
2025

China-linked APTs’ tool employed in RA World Ransomware attack

China-linked APTs’ tool employed in RA World Ransomware attack Pierluigi Paganini February 13, 2025 A November 2024 RA World ransomware…

5 Ways to hack WordPress targets
13
Feb
2025

5 Ways to hack WordPress targets

Over half a billion websites are powered by WordPress as of today. Unfortunately, not every instance deserves the same security…

Chinese espionage tools deployed in RA World ransomware attack
13
Feb
2025

Chinese espionage tools deployed in RA World ransomware attack

A China-based threat actor, tracked as Emperor Dragonfly and commonly associated with cybercriminal endeavors, has been observed using in a ransomware…

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape
13
Feb
2025

RASP (Runtime Application Self-Protection) in Mobile Application Security: A Strategic Imperative for the Modern Threat Landscape

Introduction The mobile application landscape is more dynamic and challenging than ever, with businesses increasingly relying on mobile channels to…

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts
13
Feb
2025

Astaroth Phishing Kit Bypasses 2FA to Hijack Gmail and Microsoft Accounts

New Astaroth Phishing Kit bypasses 2FA (two-factor authentication) to steal Gmail, Yahoo and Microsoft login credentials using a reverse proxy,…